BibTeX records: Zhejun Fang

download as .bib file

@inproceedings{DBLP:conf/cncert/SunFHL18,
  author       = {Zhonghao Sun and
                  Zhejun Fang and
                  Yueying He and
                  Jianqiang Li},
  editor       = {Xiaochun Yun and
                  Weiping Wen and
                  Bo Lang and
                  Hanbing Yan and
                  Li Ding and
                  Jia Li and
                  Yu Zhou},
  title        = {A Generic Architecture to Detect Vulnerability Leaks at Crowdsourced
                  Tests},
  booktitle    = {Cyber Security - 15th International Annual Conference, {CNCERT} 2018,
                  Beijing, China, August 14-16, 2018, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {970},
  pages        = {136--144},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-981-13-6621-5\_11},
  doi          = {10.1007/978-981-13-6621-5\_11},
  timestamp    = {Thu, 27 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cncert/SunFHL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/chinaf/FangLZWWW17,
  author       = {Zhejun Fang and
                  Qixu Liu and
                  Yuqing Zhang and
                  Kai Wang and
                  Zhiqiang Wang and
                  Qianru Wu},
  title        = {A static technique for detecting input validation vulnerabilities
                  in Android apps},
  journal      = {Sci. China Inf. Sci.},
  volume       = {60},
  number       = {5},
  pages        = {052111:1--052111:16},
  year         = {2017},
  url          = {https://doi.org/10.1007/s11432-015-5422-7},
  doi          = {10.1007/S11432-015-5422-7},
  timestamp    = {Thu, 18 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/chinaf/FangLZWWW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/LiangL0F17,
  author       = {Mingyue Liang and
                  Zhoujun Li and
                  Qiang Zeng and
                  Zhejun Fang},
  editor       = {Sihan Qing and
                  Chris Mitchell and
                  Liqun Chen and
                  Dongmei Liu},
  title        = {Deobfuscation of Virtualization-Obfuscated Code Through Symbolic Execution
                  and Compilation Optimization},
  booktitle    = {Information and Communications Security - 19th International Conference,
                  {ICICS} 2017, Beijing, China, December 6-8, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10631},
  pages        = {313--324},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-89500-0\_28},
  doi          = {10.1007/978-3-319-89500-0\_28},
  timestamp    = {Tue, 16 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icics/LiangL0F17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jaciii/ShiFSIO15,
  author       = {Qi Shi and
                  Zhejun Fang and
                  Jinhua She and
                  Junya Imani and
                  Yasuhiro Ohyama},
  title        = {Motion Control of a Wheeled Inverted Pendulum Using Equivalent-Input-Disturbance
                  Approach},
  journal      = {J. Adv. Comput. Intell. Intell. Informatics},
  volume       = {19},
  number       = {2},
  pages        = {293--300},
  year         = {2015},
  url          = {https://doi.org/10.20965/jaciii.2015.p0293},
  doi          = {10.20965/JACIII.2015.P0293},
  timestamp    = {Tue, 10 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jaciii/ShiFSIO15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/FangLZWW15,
  author       = {Zhejun Fang and
                  Qixu Liu and
                  Yuqing Zhang and
                  Kai Wang and
                  Zhiqiang Wang},
  editor       = {Javier L{\'{o}}pez and
                  Yongdong Wu},
  title        = {IVDroid: Static Detection for Input Validation Vulnerability in Android
                  Inter-component Communication},
  booktitle    = {Information Security Practice and Experience - 11th International
                  Conference, {ISPEC} 2015, Beijing, China, May 5-8, 2015. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9065},
  pages        = {378--392},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-17533-1\_26},
  doi          = {10.1007/978-3-319-17533-1\_26},
  timestamp    = {Thu, 18 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ispec/FangLZWW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/FangZKL14,
  author       = {Zhejun Fang and
                  Yuqing Zhang and
                  Ying Kong and
                  Qixu Liu},
  title        = {Static detection of logic vulnerabilities in Java web applications},
  journal      = {Secur. Commun. Networks},
  volume       = {7},
  number       = {3},
  pages        = {519--531},
  year         = {2014},
  url          = {https://doi.org/10.1002/sec.747},
  doi          = {10.1002/SEC.747},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/FangZKL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/KongZFL12,
  author       = {Ying Kong and
                  Yuqing Zhang and
                  Zhejun Fang and
                  Qixu Liu},
  editor       = {Geyong Min and
                  Yulei Wu and
                  Lei (Chris) Liu and
                  Xiaolong Jin and
                  Stephen A. Jarvis and
                  Ahmed Yassin Al{-}Dubai},
  title        = {Static Detection of Logic Vulnerabilities in Java Web Applications},
  booktitle    = {11th {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2012, Liverpool, United
                  Kingdom, June 25-27, 2012},
  pages        = {1083--1088},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/TrustCom.2012.266},
  doi          = {10.1109/TRUSTCOM.2012.266},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/KongZFL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icycs/GuoZWF08,
  author       = {Chi Guo and
                  Lei Zhao and
                  Lina Wang and
                  Zhejun Fang},
  title        = {A Secure Network Admission and Routing Model Based on Trust Theory},
  booktitle    = {Proceedings of the 9th International Conference for Young Computer
                  Scientists, {ICYCS} 2008, Zhang Jia Jie, Hunan, China, November 18-21,
                  2008},
  pages        = {2216--2221},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/ICYCS.2008.452},
  doi          = {10.1109/ICYCS.2008.452},
  timestamp    = {Tue, 19 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icycs/GuoZWF08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics